Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Microsoft® Windows® Registry Guide, Second Edition
A Note Regarding Supplemental Files
Acknowledgments
Introduction
This Book Is Different—Really
Power Users First, Then IT Professionals
Some Terminology
Why I Love Windows XP
Sample Files and Scripts
Resource Kit Support Policy
Final Note
System Requirements
I. Registry Overview
1. Learning the Basics
Heart and Soul of Windows
For Power Users
For IT Professionals
Registry Warnings and Myths
Must-Know Concepts
Security Identifiers
Globally Unique Identifiers
Hexadecimal Notation
Bits and Bit Masks
Little-Endian and Big-Endian
ANSI and Unicode Encoding
Null and Empty Strings
Registry Structure
Keys
Values
Types
Registry Organization
HKEY_USERS
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
Registry Management Tools
Registry Hive Files
Hives in HKLM
Hives in HKU
2. Using Registry Editor
Running Regedit
Regedit
Key Pane
Value Pane
Searching for Data
Searching Incrementally
Searching in Binary Values
Bookmarking Favorite Keys
Using Better Techniques
Editing the Registry
Changing Values
Adding Keys or Values
Deleting Keys or Values
Renaming Keys or Values
Printing the Registry
Exporting Settings to Files
Registration Files
Win9x/NT4 Registration Files
Hive Files
Text Files
Working with Hive Files
Getting Beyond Basics
3. Backing Up the Registry
Editing the Registry Safely
Copying Single Values
Backing Up to REG Files
Backing Up to Hive Files
Using System Restore
Taking Configuration Snapshots
Looking Inside System Restore
Managing System Restore
Customizing System Restore
Scripting System Restore
Backing Up the Registry Regularly
Planning a Backup Strategy
Backing Up System State Data
Restoring System State Data
Backing Up User Settings
4. Hacking the Registry
Redirecting Special Folders
Customizing Shell Folders
Renaming Desktop Icons
Using Custom Icon Images
Adding Desktop Icons
Hiding Desktop Icons
Reorganizing Control Panel
Customizing File Associations
Running Programs from My Computer
Opening Command Prompts at Targeted Folders
Rooting Windows Explorer at a Targeted Folder
Adding InfoTips to Program Classes
Adding File Templates
Preventing Messenger from Running
Personalizing the Start Menu
Configuring the Menu’s Contents
Trimming the Frequently Used Programs List
Restoring the Sort Order
Disabling Windows Tour
Creating Program Aliases
Customizing Internet Explorer
Extending the Shortcut Menus
Changing the Toolbar Background
Customizing Search URLs
Maximum Concurrent Downloads
Clearing History Lists
Running Programs at Startup
Controlling Registry Editor
Default Action for REG Files
Storing Window Position and Size
Logging On Automatically
Changing User Information
Looking for More Hacks
5. Mapping Tweak UI
General
Focus
ALT+TAB
Mouse
Hover
Wheel
X-Mouse
Explorer
Shortcut
Colors
Thumbnails
Command Keys
Customizations
Slide Show
Common Dialog Boxes
Places Bar
Taskbar and Start Menu
Grouping
Start Menu
Desktop
First Icon
My Computer
Drives
Special Folders
AutoPlay
Drive Letters
Control Panel
Templates
Internet Explorer
Toolbar Background
Search
View Source
Small Animation
Large Animation
Image Toolbar
Command Prompt
Logon
Autologon
Settings
Screen Saver
6. Configuring Servers
Server Customizations
Adding Comments to Server Announcements
Optimizing the Server Service
Authentication
Configuring Kerberos
Disabling Global Catalog Requirement
Enabling Verbose Winlogon Messages
Internet Information Services
Configuring Http.sys
Using Incremental Site ID Numbers
Network Connections
Enabling IP Forwarding
Changing MTU Settings
Shutdown Event Tracker
II. Registry in Management
7. Using Registry-Based Policy
Editing Local Policies
Group Policy Extensions
Registry-Based Policy
Group Policy Storage
Extending Registry-Based Policy
Comments
Strings
CLASS
Syntax
Example
CATEGORY
Syntax
Example
Keywords
KEYNAME
POLICY
Syntax
Example
Keywords
EXPLAIN
VALUENAME
VALUEON and VALUEOFF
ACTIONLIST
Syntax
Example
PART
Syntax
Example
Keywords
CHECKBOX
Syntax
Example
Keywords
COMBOBOX
Syntax
Example
Keywords
DROPDOWNLIST
Syntax
Example
Keywords
EDITTEXT
Syntax
Example
Keywords
LISTBOX
Syntax
Example
Keywords
NUMERIC
Syntax
Example
Keywords
TEXT
Syntax
Example
Deploying Registry-Based Policy
Windows 2000 Server-Based Networks
Windows NT–Based Networks and Other Networks
Customizing Windows
Using the Group Policy Tools
Gpresult
Syntax
Examples
Gpupdate
Syntax
Examples
Help and Support Center
Resultant Set of Policy
Using DesktopStandard PolicyMaker
Finding More Resources
8. Configuring Windows Security
Setting Permissions for Keys
Adding Users to ACLs
Removing Users from ACLs
Assigning Special Permissions
Mapping Default Permissions
Taking Ownership of Keys
Auditing Registry Access
Preventing Local Registry Access
Restricting Remote Registry Access
Deploying Security Templates
Creating a Security Management Console
Choosing a Predefined Security Template
Building a Custom Security Template
Analyzing a Computer’s Configuration
Modifying a Computer’s Configuration
Deploying Security Templates on the Network
Configuring New Security Features
Security Center Alerts
Windows Firewall
Internet Explorer Privacy Settings
Internet Explorer Security Zones
TemplatePolicies
ZoneMap
Zones
9. Troubleshooting Problems
Fixing Corrupt Settings
Allowing Windows to Fix Errors
Repairing an Application’s Settings
Removing Programs from the Registry
Using Another Computer’s Settings
Recovering from Disasters
Windows Advanced Options Menu
Windows Recovery Console
Automated System Recovery
Diagnosing Registry Corruption
Power Failure
File Corruption and Faulty Hardware
The Registry Is Written To at Shutdown
Repairing a Corrupt Registry
Step 1
Step 2
Step 3
Step 4
10. Finding Registry Settings
Comparing REG Files
Using WinDiff
Using Word 2003
Comparing with Reg.exe
Auditing the Registry
Setting Audit Policy
Auditing Registry Keys
Analyzing the Results
Monitoring the Registry
Using Winternals Regmon
Filtering for Better Results
11. Scripting Registry Changes
Choosing a Technique
Installing INF Files
Starting with a Template
Linking Sections Together
Adding Keys and Values
Syntax
Example
Deleting Keys and Values
Syntax
Example
Setting and Clearing Bits
Syntax
Example
Using Strings in INF Files
Setting Values with REG Files
Exporting Settings to REG Files
Creating REG Files Manually
Encoding Special Characters
Deleting Keys Using a REG File
Editing from the Command Prompt
Adding Keys and Values
Syntax
Example
Querying Values
Syntax
Example
Deleting Keys and Values
Syntax
Example
Comparing Keys and Values
Syntax
Example
Copying Keys and Values
Syntax
Example
Exporting Keys to REG Files
Syntax
Example
Importing REG Files
Syntax
Example
Saving Keys to Hive Files
Syntax
Example
Restoring Hive Files to Keys
Syntax
Example
Loading Hive Files
Syntax
Example
Unloading Hive Files
Syntax
Example
Scripting Using Windows Script Host
Creating Script Files
Running Script Files
Syntax
Formatting Key and Value Names
Adding and Updating Values
Syntax
Example (VBScript)
Example (JScript)
Removing Keys and Values
Syntax
Example (VBScript)
Example (JScript)
Querying Registry Values
Syntax
Example (VBScript)
Example (JScript)
Creating Windows Installer Packages
III. Registry in Deployment
12. Deploying User Profiles
Exploring User Profiles
Profile Hives
Profile Folders
Special Profiles
Getting User Profiles
Local Profiles
Roaming Profiles
Using Roaming User Profiles
Managing Roaming User Profiles
Understanding Fast Network Logon
Understanding the New Merge
Deploying Default User Profiles
Customizing User Settings
Cleaning User Profiles
Creating Default User Folders
Deploying Default User Folders
Coexisting with Earlier Versions of Windows
Migrating User Settings to Windows
Files And Settings Transfer Wizard
User State Migration Tool
13. Mapping Windows Installer
Repairing Registry Settings
Managing Windows Installer with Policies
Installing with Elevated Privileges
Caching Transforms in a Secure Location
Locking Down Windows Installer
Removing Windows Installer Data
Msizap.exe
Msicuu.exe
Inventorying Applications
14. Deploying with Answer Files
Creating Distribution Folders
Customizing Answer Files
Setup Manager
Notepad and Other Text Editors
Adding Settings to Unattend.txt
[GuiRunOnce]
Cmdlines.txt
Adding Multiple Settings with One Script
Logging On Automatically After Installation
15. Cloning Disks with Sysprep
Cloning Windows
Windows Tools
Sysprep Limitations
Building a Disk Image
Customizing Mini-Setup
Preparing for Duplication
Cloning the Disk Image
Reducing Image Count
Filling SysprepMassStorage Manually
Filling SysprepMassStorage Automatically
Cleaning Up After Sysprep
Removing the Paging File
Mapping Sysprep Settings
Keeping Perspective
16. Configuring Windows PE
Exploring Windows PE
Capabilities
Limitations
Using Windows PE as an Installation Platform
Starting the Computer
Configuring the Hard Disks
Installing Windows
Customizing Windows PE
Command-Line Tools
Optional Components
Network Drivers
Mass-Storage Drivers
Languages
Starting Windows PE
CD-Based Installation
RIS-Based Installation
Disk-Based Installation
Automating Installations
17. Deploying Office 2003 Settings
Profile Wizard
Customizing the Wizard
Capturing Settings
Deploying Settings
Custom Installation Wizard
Adding and Removing Registry Entries
Customizing Default Application Settings
Changing Office User Settings
Adding Installations and Running Programs
Custom Maintenance Wizard
Group and System Policy
18. Fixing Common IT Problems
Controlling Just-in-Time Setup
Outlook Express
Windows Media Player
Desktop Themes
Other Shortcuts
Removing Components
Answer File [Components] Section
Extending Windows Components Wizard
Hiding Non-Removable Components
Removing Policy Tattoos
Elevating Privileges of Processes
Group Policy
Secondary Logon
Scheduled Tasks
AutoLogon
Severing File Associations
Deploying Office Trusted Sources
Enabling Remote Desktop Remotely
Customizing the Windows Logon
Restoring Administrative Shares
Changing Source Location
IV. Appendixes
A. File Associations
Merge Algorithm
File Extension Keys
OpenWithList
PerceivedType
ShellNew
Program Class Keys
DefaultIcon
EditFlags
Shell
Specialized Keys
Applications
SystemFileAssociations
Unknown
COM Class Keys
B. Network Settings
HKCU\Network
HKLM\SYSTEM\CurrentControlSet\Services
LanmanServer
LanmanWorkstation
Tcpip\Parameters
Tcpip\Interfaces
C. Per-User Settings
AppEvents
Console
Control Panel
Desktop
Desktop\WindowMetrics
Mouse
Environment
Keyboard Layout
Network
Printers
SessionInformation
Software
Classes
Microsoft\Command Processor
Microsoft\Internet Connection Wizard
Microsoft\Internet Explorer
Microsoft\Internet Explorer\MenuExt
Microsoft\Internet Explorer\SearchURL
Microsoft\MessengerService
Microsoft\Office
Microsoft\Search Assistant
Microsoft\VBA\Trusted
Policies
Software\Microsoft\Windows\CurrentVersion
Explorer\Advanced
Explorer\AutoComplete
Explorer\ComDlg32
Explorer\HideDesktopIcons
Explorer\HideMyComputerIcons
Explorer\MenuOrder
Explorer\RecentDocs
Explorer\RunMRU
Explorer\User Shell Folders
D. Per-Computer Settings
HARDWARE
DESCRIPTION
DEVICEMAP
SAM
SECURITY
SOFTWARE
Classes
Clients
Microsoft\Active Setup
Microsoft\Command Processor
Microsoft\Driver Signing
Microsoft\DrWatson
Microsoft\Internet Explorer
Microsoft\Sysprep
Microsoft\Windows NT\CurrentVersion
Microsoft\Windows NT\CurrentVersion\Winlogon
Policies
SOFTWARE\Microsoft\Windows\CurrentVersion
App Paths
Applets
Explorer
Explorer\AutoplayHandlers
Explorer\Desktop\NameSpace
Explorer\FindExtensions
Explorer\HideDesktopIcons
Explorer\HideMyComputerIcons
Explorer\MyComputer
Explorer\NetworkNeighborhood\NameSpace
Explorer\RemoteComputer\NameSpace
Explorer\StartMenu
Explorer\User Shell Folders
Explorer\VisualEffects
Policies
Run
RunOnce
Uninstall
SYSTEM
CurrentControlSet\Control
CurrentControlSet\Enum
CurrentControlSet\Hardware Profiles
CurrentControlSet\Services
About the Author
Index
About the Author
Copyright
← Prev
Back
Next →
← Prev
Back
Next →